copyright | disclaimer | privacy | contact  
Australia's Leading Computer Emergency Response Team
 
Search this site

 
On this site

 > HOME
 > About AusCERT
 > Membership
 > Contact Us
 > PKI Services
 > Training
 > Publications
 > Sec. Bulletins
 > Conferences
 > News & Media
 > Services
 > Web Log
 > Site Map
 > Site Help
 > Member login





 

ESB-2006.0288 -- [SCO] -- CUPS Multiple Buffer Overflow Vulnerabilities

Date: 24 April 2006
References: ESB-2005.1002  

Click here for printable version
Click here for PGP verifiable version
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                          ESB-2006.0288 -- [SCO]
               CUPS Multiple Buffer Overflow Vulnerabilities
                               24 April 2006

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           CUPS
Publisher:         SCO
Operating System:  SCO OpenServer 5.0.7
                   SCO OpenServer 6.0.0
                   SCO UnixWare 7.1.4
Impact:            Execute Arbitrary Code/Commands
                   Denial of Service
Access:            Remote/Unauthenticated
CVE Names:         CVE-2005-3193 CVE-2005-3192 CVE-2005-3191

Ref:               ESB-2005.1002

Comment: This bulletin contains two separate SCO advisories, describing the
         same CUPS vulnerability in both OpenServer and UnixWare.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

			SCO Security Advisory

Subject:		OpenServer 5.0.7 OpenServer 6.0.0 : CUPS Multiple Buffer Overflow Vulnerabilities
Advisory number: 	SCOSA-2006.20
Issue date: 		2006 April 18
Cross reference:	fz533446
			CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 
______________________________________________________________________________


1. Problem Description

	Some vulnerabilities have been reported in CUPS, which can
	be exploited by malicious people to cause a DoS (Denial of
	Service) and potentially to compromise a vulnerable system.
	
	The vulnerabilities are caused due to the use of a vulnerable
	version of Xpdf.
	
	The Common Vulnerabilities and Exposures project
	(cve.mitre.org) has assigned the names CVE-2005-3191,
	CVE-2005-3192, and CVE-2005-3193 to these issues.


2. Vulnerable Supported Versions

	System				Binaries
	----------------------------------------------------------------------
	OpenServer 5.0.7 		Cups package
	OpenServer 6.0.0 		Cups package


3. Solution

	The proper solution is to install the latest packages.


4. OpenServer 5.0.7

	4.1 Location of Fixed Binaries

	ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20


	4.2 Verification

	MD5 (p533446.507_vol.tar) = 6150ddaec1548e98e543ae030b2c9de4

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following sequence:

	1) Download p533446.507_vol.tar to a directory.

	2) Extract VOL* files.

	   # tar xvf p533446.507_vol.tar

	3) Run the custom command, specify an install
	   from media images, and specify the directory as
	   the location of the images.


5. OpenServer 6.0.0

	5.1 Location of Fixed Binaries

	ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.20


	5.2 Verification

	MD5 (p533446.600_vol.tar) = c4e87cee43acf3e6a55d0416601c92a6

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	5.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following sequence:

	1) Download p533446.600_vol.tar to a directory.

	2) Extract VOL* files.

	   # tar xvf p533446.600_vol.tar

	3) Run the custom command, specify an install
	   from media images, and specify the directory as
	   the location of the images.


6. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
		http://secunia.com/advisories/17976/

	SCO security resources:
		http://www.sco.com/support/security/index.html

	SCO security advisories via email
		http://www.sco.com/support/forums/security.html

	This security fix closes SCO incidents fz533446.


7. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


______________________________________________________________________________
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (SCO_SV)

iD8DBQFERVAUaqoBO7ipriERAoq6AJ4rV8/X01VWf+DQ33T4P4vVtDR5cwCfQiOP
09BcDpxsRtRb5saMVbPOsVs=
=TlR1
- -----END PGP SIGNATURE-----

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

______________________________________________________________________________

			SCO Security Advisory

Subject:		UnixWare 7.1.4 : CUPS Multiple Buffer Overflow Vulnerabilities
Advisory number: 	SCOSA-2006.21
Issue date: 		2006 April 18
Cross reference:	fz533446
			CVE-2005-3191 CVE-2005-3192 CVE-2005-3193 
______________________________________________________________________________


1. Problem Description

	Some vulnerabilities have been reported in CUPS, which can
	be exploited by malicious people to cause a DoS (Denial of
	Service) and potentially to compromise a vulnerable system.
	
	The vulnerabilities are caused due to the use of a vulnerable
	version of Xpdf.
	
	The Common Vulnerabilities and Exposures project
	(cve.mitre.org) has assigned the names CVE-2005-3191,
	CVE-2005-3192, and CVE-2005-3193 to these issues.


2. Vulnerable Supported Versions

	System				Binaries
	----------------------------------------------------------------------
	UnixWare 7.1.4			Cups package


3. Solution

	The proper solution is to install the latest packages.


4. UnixWare 7.1.4

	4.1 Location of Fixed Binaries

	ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.21


	4.2 Verification

	MD5 (p533446.714.image) = 1bbbd92df9260f0ac32cf27ad03b4532

	md5 is available for download from
		ftp://ftp.sco.com/pub/security/tools


	4.3 Installing Fixed Binaries

	Upgrade the affected binaries with the following sequence:

	Download p533446.714.image to the /var/spool/pkg directory

	# pkgadd -d /var/spool/pkg/p533446.714.image


5. References

	Specific references for this advisory:
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3191
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3192
		http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3193
		http://secunia.com/advisories/17976/

	SCO security resources:
		http://www.sco.com/support/security/index.html

	SCO security advisories via email
		http://www.sco.com/support/forums/security.html

	This security fix closes SCO incidents fz533446.


6. Disclaimer

	SCO is not responsible for the misuse of any of the information
	we provide on this website and/or through our security
	advisories. Our advisories are a service to our customers intended
	to promote secure installation and use of SCO products.


______________________________________________________________________________
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2.2 (SCO_SV)

iD8DBQFERlkmaqoBO7ipriERAk7zAJ0Q+vs/nCHC44LI9s1Am73hFqJacACfYkhQ
OwhdzIoyILAJA3ZkI1bpi/A=
=s7Zo
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

If you believe that your computer system has been compromised or attacked in 
any way, we encourage you to let us know by completing the secure National IT 
Incident Reporting Form at:

        http://www.auscert.org.au/render.html?it=3192

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================

-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQCVAwUBRExWBCh9+71yA2DNAQLPdgP/S6WuyfbB8jxyeO+ZU4Wc3uIhUHfHSNWf
RXFltH42qdjGrtPQzugmbltqewHaB8rbRD9yIReEe4lRObhNpwbANjyFGPbxVCw8
+kVz1QW/n9PGLDJ24sHLA+WcEkL/E8JcjhYP36LKxcuMmgXWmj2rPeT0Vjpu5hHt
GfZsLkekoXY=
=Sc6z
-----END PGP SIGNATURE-----